Tag Archives: SEO

Two days after researchers exposed a National Security Agency-tied hacking group that operated in secret for more than a decade, CIA hackers convened an online discussion aimed at preventing the same kind of unwelcome attention. The thread, according to a document WikiLeaks published Tuesday, was titled “What did Equation do wrong, …

OS command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. the attacker-supplied operating system …

Basic HTTP authentication is a method for providing username and password when making a request for particular web resources. The client sends the user name and password as unencrypted base64 encoded text. When an anonymous request for protected resource is received by HTTP, it can force the use of Basic …

We have compiled a group of Wireless Attacking Tools available in Kali that are used for wireless attacks. Note: This post is for experimental purposes. 1. Aircrack-ng Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements …

According to news released by BBC, South Korea’s military cyber command, set up to guard against hacking, appears to have been breached by North Korea, the military has said. A spokesman told the BBC that classified information was thought to have been stolen, although it is not clear exactly what …

This time one of the World’s leading video sharing platform Daily Motion is targeted by an unknown hacker. According to Bleeping Computer unknown hacker has supposedly breached video sharing platform DailyMotion and stolen details for 87.6 million accounts, belonging to approximately 85 million users, according to data breach index website …

Usually you won’t see any organization or institution allowing you to hack their internal system for any cause but this time without getting into any trouble the US Military is allowing hackers a chance to point out vulnerabilities in their online systems. The permission is granted through a military-wide applicable, …

According to krebsonsecurity, criminals this morning massively attacked Dyn, a company that provides core Internet services for Twitter, SoundCloud, Spotify, Reddit and a host of other sites, causing outages and slowness for many of Dyn’s customers. A widespread cyber-attack was carried out against some of the world’s biggest websites on …

Police in the Czech Republic have detained a Russian man suspected of participating in the breach of LinkedIn user information in 2012, the company said Wednesday. Czech police said the Russian was arrested in cooperation with the FBI within 12 hours, thanks to a rapid exchange of information with American …

World Wide Web commonly known as Web is a collection of electronic hyper text documents stored in a computer linked together like a spider’s web which can be accessed via internet. The web browser is a software program that acts like a computer program e.g firefox, chrome, safari (Web clients). …

WASHINGTON — U.S. officials blame hackers guided by the Russian government for the attacks on DNC servers earlier this year that resulted in WikiLeaks publishing about 20,000 private emails just before Hillary Clinton’s nominating convention in July. Russia no longer denies hacking DNC. Vladimir Putin said the hacking of thousands …

SSI Injection (Server side Includes) is a server-side exploit technique that allows an attacker to send code into a web application, which will later be executed locally by the web server. SSI Injection SSI are generally the directives that are present on the web applications which are used to feed …

One of the high marketplace private exploit seller Zerodium has tripled the price of iOS rewards. The engineers and penetration testers of Zerodium (a premium exploit platform) who purchases zero-day vulnerabilities and exploits decided to pay heavy rewards to researchers who are showing interest that ultimately results in discovering unknown …

DNS Spoofing is also known as DNS cache poisoning. It is malicious technique used by attackers to divert legitimate traffic to attacker’s fake website for his own sake. DNS Spoofing The main idea behind DNS spoofing is that attacker introduces a corrupt domain name in the DNS resolver’s cache, where …

In computer security and cryptography (study of techniques for secure communication in the presence of third parties), man-in-the-middle is an attack where an attacker secretly keeps an eye on the communication happening in between two legitimate users while they are not aware of any external threat. Man-in-the-middle attack is one …